CYBERSCOPE-CE-E
SKU: CYBERSCOPE-CE-ER305,000.00
- Validate edge infrastructure hardening, including wireless access point security
- Verify secure baselines, rapidly identify deviations
- Confirm wired and WiFi security
- Automate network discovery and vulnerability scanning
- Maps to key CIS Critical Security Controls / NIST Cybersecurity Framework Core Functions
Available: In stock
Available on back-order
Description
CyberScope helps you to quickly discover, identify, and test edge infrastructure and IoT, OT, and ICS devices, wired (Ethernet/copper/Fiber) and WiFi networks. You can then assess cybersecurity posture against policies, generate reports and perform ongoing monitoring—all without deploying agents.
- Portable, handheld form factor – for you to use or send anywhere. The CyberScope delivers a unique view that cannot be replicated by centralised platforms or agents
- Discovery with integrated vulnerability scanning – Quickly inventory infrastructure and /IoT/OT/ICS devices, you can locate rogue assets, scan for vulnerabilities with integrated Nmap technology, and compare against baselines
- Simple UI with secure remote access – Valuable for all staff levels and your expert staff can remotely assist from anywhere
- Integration of Nmap with AutoTest – You can perform automated scans to validate infrastructure hardening including SNMP, HTTPS, SSH, management VLAN, and network segments and scan for vulnerabilities
- WiFi security validation – Supports WiFi 2.4, 5 & 6 GHz bands, offers numerous advanced cybersecurity capabilities to test for presence and use of wireless attributes (WiFi PMF/Personal/Client Isolation, mDNS/ ZeroConf, and beaconing)
- Automated discovery monitoring – Generate baselines, upload ongoing snapshots to Link-Live™ cloud platform (or on-prem) for fast detection of challenges and vulnerabilities.
- Link-Live collaboration, reporting, and analytics platform – Maximize team efficiencies, enhance assessments/audits, improve cybersecurity posture with the combination of CyberScope and Link-Live cloud or on-prem.
Tags: Cyber Security, NetAlly
Content missing